Nanjing University of Posts and Telecommunications

Displaying 1-23 of 23 results

This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficiency of network transmission, the authors combine interflow network coding and DIstributed Source Coding Using Syndromes (DISCUS). Furthermore, for...

Clustering is an efficient method adopted in various routing algorithms for wireless sensor networks. In this paper, the authors propose a Density-based Energy-efficient Clustering Algorithm (DECA). In DECA, they define the density of each node and regard it as an important evaluation metric. Together with nodes' residual energy under consideration,...

In Wireless Sensor Networks (WSNs), due to the limitation of nodes' energy, energy efficiency is an important factor should be considered when the protocols are designing. As a typical representative of hierarchical routing protocols, LEACH Protocol plays an important role. In response to the uneven energy distribution that is caused...

Digital signatures are one of the most important fundamental cryptographic primitives, which can be used to construct complex cryptographic protocols. However, most practical signatures can only be proved secure in random oracles, while signatures in standard model are often considered as less efficient or based on the stronger assumptions, such...

In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, Cloud Server (CS) must prove to a verifier that it is actually storing all of the client's data unchanged. And, enabling public auditability for...

Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary cannot trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, the...

One of the key problems in Radio Frequency IDentification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. RAPP is...

This paper presents a theoretical explanation and test results that an amount of information would not increase infinitely in transmission via the mathematical model of the matter for deciphering original works of information entropy and the principle of thermodynamic entropy. The rate formula with energy is derived via retrieval speed...

In this paper, the authors proposed a Support Vector Machine (SVM) awareness model based on Genetic Algorithm (GA) Optimization for Peer-To-Peer (P2P) network traffic. On the basis of traffic feature, they created a traffic awareness model which introduced SVM as well as utilized GA to optimize the required feature samples,...

Energy consumption remains one of the main challenges in WSN applications. To prolong the network lifetime, this paper researches the effect of battery energy renewing in Wireless Sensor Networks (WSNs) from energy scavenging among sensors and battery recovery effect through appropriate idle time. On these bases, the authors propose a...

The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in...

Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-To-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback...

In this paper, the authors investigate the blind source separability of linear FIR-MIMO systems. The concept of semi-reversibility of a system is presented. It is shown that for a semi-reversible system, if the input signals belong to a binary alphabet, then the source data can be blindly separated. One sufficient...

TFRC protocol is suitable for video transmission in a wire network, and quality assessment is also essential in a video transmission system. In this paper, a real-time video transmission system based on TFRC protocol is proposed, and the evaluation model about the system is improved in the framework of Evalvid....

Cloud Storage provides users with storage space and make user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. In this paper, mathematical description for...

For CR systems, where primary and CR users coexist in adjacent bands, it is important to keep the interference introduced to the Primary User (PU) band within a tolerable range. In this paper, the authors investigate the subcarrier and power allocation problem in CR systems, where primary and CR users...

Cognitive Radio (CR) is a revolution in wireless communication and CR Ad Hoc Network (CRAHN) is under extensive research recently. In CRAHN, no control network infrastructure can be utilized and CR users have to attain the first hand information for networking. Neighbor discovery is a fundamental work for cooperation among...

Combining network code with Cyclic Redundancy Check (CRC), a two-dimension iterative decoder is proposed for network coded cooperation. The decoder organizes the network code as a row decoder, and CRC as a column decoder. The Log-Likelihood Ratios (LLR) of received signal is used as soft information for iterations. The performances...

Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number...

Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds...

Free probability theory, which has became a main branch of random matrix theory, is a valuable tool for describing the asymptotic behavior of multiple systems, especially for large random matrices. In this paper, using free probability theory, a new cooperative scheme for spectrum sensing is proposed, which shows how asymptotic...

In the paper, an opportunistic cooperation scheme is proposed to make an efficient use of the cooperative relay, where whether the cooperative transmission will be adopted depends on the channel quality from the source to the relay, as opposed to the deterministic cooperation regardless of the relay channel conditions. Closed-form...

In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, Cloud Server (CS) must prove to a verifier that it is actually storing all of the client's data unchanged. And, enabling public auditability for...

Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary cannot trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, the...

One of the key problems in Radio Frequency IDentification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. RAPP is...

Clustering is an efficient method adopted in various routing algorithms for wireless sensor networks. In this paper, the authors propose a Density-based Energy-efficient Clustering Algorithm (DECA). In DECA, they define the density of each node and regard it as an important evaluation metric. Together with nodes' residual energy under consideration,...

Digital signatures are one of the most important fundamental cryptographic primitives, which can be used to construct complex cryptographic protocols. However, most practical signatures can only be proved secure in random oracles, while signatures in standard model are often considered as less efficient or based on the stronger assumptions, such...

Free probability theory, which has became a main branch of random matrix theory, is a valuable tool for describing the asymptotic behavior of multiple systems, especially for large random matrices. In this paper, using free probability theory, a new cooperative scheme for spectrum sensing is proposed, which shows how asymptotic...

In Wireless Sensor Networks (WSNs), due to the limitation of nodes' energy, energy efficiency is an important factor should be considered when the protocols are designing. As a typical representative of hierarchical routing protocols, LEACH Protocol plays an important role. In response to the uneven energy distribution that is caused...

This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficiency of network transmission, the authors combine interflow network coding and DIstributed Source Coding Using Syndromes (DISCUS). Furthermore, for...

Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds...

Cloud Storage provides users with storage space and make user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. In this paper, mathematical description for...

In this paper, the authors investigate the blind source separability of linear FIR-MIMO systems. The concept of semi-reversibility of a system is presented. It is shown that for a semi-reversible system, if the input signals belong to a binary alphabet, then the source data can be blindly separated. One sufficient...

For CR systems, where primary and CR users coexist in adjacent bands, it is important to keep the interference introduced to the Primary User (PU) band within a tolerable range. In this paper, the authors investigate the subcarrier and power allocation problem in CR systems, where primary and CR users...

TFRC protocol is suitable for video transmission in a wire network, and quality assessment is also essential in a video transmission system. In this paper, a real-time video transmission system based on TFRC protocol is proposed, and the evaluation model about the system is improved in the framework of Evalvid....

In the paper, an opportunistic cooperation scheme is proposed to make an efficient use of the cooperative relay, where whether the cooperative transmission will be adopted depends on the channel quality from the source to the relay, as opposed to the deterministic cooperation regardless of the relay channel conditions. Closed-form...

Cognitive Radio (CR) is a revolution in wireless communication and CR Ad Hoc Network (CRAHN) is under extensive research recently. In CRAHN, no control network infrastructure can be utilized and CR users have to attain the first hand information for networking. Neighbor discovery is a fundamental work for cooperation among...

Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number...

Combining network code with Cyclic Redundancy Check (CRC), a two-dimension iterative decoder is proposed for network coded cooperation. The decoder organizes the network code as a row decoder, and CRC as a column decoder. The Log-Likelihood Ratios (LLR) of received signal is used as soft information for iterations. The performances...

In this paper, the authors proposed a Support Vector Machine (SVM) awareness model based on Genetic Algorithm (GA) Optimization for Peer-To-Peer (P2P) network traffic. On the basis of traffic feature, they created a traffic awareness model which introduced SVM as well as utilized GA to optimize the required feature samples,...

Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-To-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback...

The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in...

Energy consumption remains one of the main challenges in WSN applications. To prolong the network lifetime, this paper researches the effect of battery energy renewing in Wireless Sensor Networks (WSNs) from energy scavenging among sensors and battery recovery effect through appropriate idle time. On these bases, the authors propose a...

This paper presents a theoretical explanation and test results that an amount of information would not increase infinitely in transmission via the mathematical model of the matter for deciphering original works of information entropy and the principle of thermodynamic entropy. The rate formula with energy is derived via retrieval speed...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?